The public key infrastructure is a system that can verify the identity of an individual or an organization during an Internet transaction. Through the issuance of a digital certificate from a certification authority, each individual or organization receives a unique private key and public key. If a sender encrypts information using a receiver's public key, only the receiver can decrypt the information using his own private key. On the other hand, if a sender wants to provide information in the message for the receiver to verify his identity, he can use his own private key to encrypt his signature in the message, so that the receiver can verify the digital signature with the sender's public key. The use of public key cryptography does not only provide a means of verifying authorship on the Internet, it also ensures the integrity of the information sent to the receiver.

The public key infrastructure is a system that can verify the identity of an individual or an organization during an Internet transaction. Through the issuance of a digital certificate from a certification authority, each individual or organization receives a unique private key and public key. If a sender encrypts information using a receiver's public key, only the receiver can decrypt the information using his own private key. On the other hand, if a sender wants to provide information in the message for the receiver to verify his identity, he can use his own private key to encrypt his signature in the message, so that the receiver can verify the digital signature with the sender's public key. The use of public key cryptography does not only provide a means of verifying authorship on the Internet, it also ensures the integrity of the information sent to the receiver.

Level:

Duration:

Worksheet:

Answer:

The public key infrastructure is a system that can verify the identity of an individual or an organization during an Internet transaction. Through the issuance of a digital certificate from a certification authority, each individual or organization receives a unique private key and public key. If a sender encrypts information using a receiver's public key, only the receiver can decrypt the information using his own private key. On the other hand, if a sender wants to provide information in the message for the receiver to verify his identity, he can use his own private key to encrypt his signature in the message, so that the receiver can verify the digital signature with the sender's public key. The use of public key cryptography does not only provide a means of verifying authorship on the Internet, it also ensures the integrity of the information sent to the receiver.